Rapid7 Vulnerability & Exploit Database

RHSA-2016:0305: openssl security update

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

RHSA-2016:0305: openssl security update

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
02/14/2016
Created
07/25/2018
Added
03/01/2016
Modified
03/21/2018

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.A padding oracle flaw was found in the Secure Sockets Layer version 2.0(SSLv2) protocol. An attacker can potentially use this flaw to decryptRSA-encrypted cipher text from a connection using a newer SSL/TLS protocolversion, allowing them to decrypt such connections. This cross-protocolattack is publicly referred to as DROWN. (CVE-2016-0800)Note: This issue was addressed by disabling the SSLv2 protocol by defaultwhen using the 'SSLv23' connection methods, and removing support for weakSSLv2 cipher suites. For more information, refer to the knowledge basearticle linked to in the References section.A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2ciphers that have been disabled on the server. This could result in weakSSLv2 ciphers being used for SSLv2 connections, making them vulnerable toman-in-the-middle attacks. (CVE-2015-3197)Red Hat would like to thank the OpenSSL project for reporting these issues.Upstream acknowledges Nimrod Aviram and Sebastian Schinzel as the originalreporters.All openssl users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library must be restarted, orthe system rebooted.

Solution(s)

  • redhat-upgrade-openssl
  • redhat-upgrade-openssl-debuginfo
  • redhat-upgrade-openssl-devel
  • redhat-upgrade-openssl-libs
  • redhat-upgrade-openssl-perl
  • redhat-upgrade-openssl-static

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;